Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 02:40
Behavioral task
behavioral1
Sample
b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
b471a54046eedc5d39eb2097fa738bff
-
SHA1
14c139798a76b5558aa337b8ee7347c199bb503e
-
SHA256
c49431ce8bca1ad641c0a626e1c49f63a37760626ea2986caaafb9ea1b8eb594
-
SHA512
8bb805a82d9d2d40e88fbc67d1aa7d4fd44ed01b0c44808bef0f5520d959266bd978f78c8a2412e148490b4b427691c9ee0bd3e820c5b9e223b3ea2e7513387c
-
SSDEEP
24576:NsyGt8Qzhs5XMD/ydu+9Hv4gAh4RX/lUztGejw7RieanaVyY6sml2DmjC4J:NsTt8Es5cbyUAH2EX/At2Yeana5mAaX
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
ModiLoader Second Stage 30 IoCs
resource yara_rule behavioral2/memory/5100-1-0x0000000000401000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5100-2-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/5100-3-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/5100-13-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-15-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-14-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-24-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-23-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-25-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-32-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-33-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-34-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-35-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-36-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-37-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-40-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-41-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-42-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-45-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-48-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-51-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-54-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-57-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-60-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-63-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-66-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-69-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-72-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-75-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 behavioral2/memory/100-78-0x0000000000400000-0x000000000074F000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 100 mstwain32.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine mstwain32.exe -
Loads dropped DLL 4 IoCs
pid Process 100 mstwain32.exe 100 mstwain32.exe 100 mstwain32.exe 100 mstwain32.exe -
resource yara_rule behavioral2/memory/5100-0-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/5100-2-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/5100-3-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/files/0x000400000001db5f-8.dat themida behavioral2/memory/5100-13-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-15-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-14-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-24-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-23-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-25-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-32-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-33-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-34-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-35-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-36-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-37-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-40-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-41-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-42-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-45-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-48-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-51-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-54-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-57-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-60-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-63-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-66-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-69-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-72-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-75-0x0000000000400000-0x000000000074F000-memory.dmp themida behavioral2/memory/100-78-0x0000000000400000-0x000000000074F000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstwain32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 100 mstwain32.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mstwain32.exe b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe File opened for modification C:\Windows\mstwain32.exe b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe File created C:\Windows\ntdtcstp.dll mstwain32.exe File created C:\Windows\cmsetac.dll mstwain32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstwain32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 100 mstwain32.exe 100 mstwain32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe Token: SeBackupPrivilege 3476 vssvc.exe Token: SeRestorePrivilege 3476 vssvc.exe Token: SeAuditPrivilege 3476 vssvc.exe Token: SeDebugPrivilege 100 mstwain32.exe Token: SeDebugPrivilege 100 mstwain32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 100 mstwain32.exe 100 mstwain32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5100 wrote to memory of 100 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 87 PID 5100 wrote to memory of 100 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 87 PID 5100 wrote to memory of 100 5100 b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe 87 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" mstwain32.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b471a54046eedc5d39eb2097fa738bff_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\mstwain32.exe"C:\Windows\mstwain32.exe"2⤵
- UAC bypass
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:100
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3476
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD543f3cf231d8726f5557e2291599658d2
SHA1e76951e9139d0dfcfd598053a3306042fb4baca4
SHA25676d199d75d8007f8a08ff16263f9649fc24db103751bf8a42bb133e1c6fc5234
SHA51237ae45b2f751656f3e5e53ad34688eefe2b7404be8bd3cce1ba7a8a563d4bac03791db39203bcfb70208bdd6356f7f06b72764c5a8033f85194b55200b825ed5
-
Filesize
1.5MB
MD5b471a54046eedc5d39eb2097fa738bff
SHA114c139798a76b5558aa337b8ee7347c199bb503e
SHA256c49431ce8bca1ad641c0a626e1c49f63a37760626ea2986caaafb9ea1b8eb594
SHA5128bb805a82d9d2d40e88fbc67d1aa7d4fd44ed01b0c44808bef0f5520d959266bd978f78c8a2412e148490b4b427691c9ee0bd3e820c5b9e223b3ea2e7513387c
-
Filesize
7KB
MD567587e25a971a141628d7f07bd40ffa0
SHA176fcd014539a3bb247cc0b761225f68bd6055f6b
SHA256e6829866322d68d5c5b78e3d48dcec70a41cdc42c6f357a44fd329f74a8b4378
SHA5126e6de7aa02c48f8b96b06e5f1160fbc5c95312320636e138cc997ef3362a61bc50ec03db1f06292eb964cd71915ddb2ec2eb741432c7da44215a4acbb576a350